CVE-2024-13281
📋 TL;DR
This CVE describes an incorrect authorization vulnerability in Drupal's Monster Menus module that allows forceful browsing (unauthorized access to restricted pages). Attackers can bypass access controls to view or interact with content they shouldn't have permission to access. This affects all Drupal sites using vulnerable versions of the Monster Menus module.
💻 Affected Systems
- Drupal Monster Menus module
📦 What is this software?
Monster Menus by Monster Menus Project
Monster Menus by Monster Menus Project
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain administrative access to the Drupal site, modify content, install malicious modules, or exfiltrate sensitive user data.
Likely Case
Unauthorized users access restricted content pages, user profiles, or administrative interfaces they shouldn't have permission to view.
If Mitigated
Limited exposure of non-critical restricted content if proper network segmentation and additional authentication layers are in place.
🎯 Exploit Status
Exploitation requires some understanding of Drupal's menu system but doesn't require advanced technical skills. Attackers need at least some level of access to the site.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 9.3.2
Vendor Advisory: https://www.drupal.org/sa-contrib-2024-045
Restart Required: No
Instructions:
1. Log into Drupal admin panel. 2. Navigate to Extend > Update. 3. Check for available updates. 4. Update Monster Menus module to version 9.3.2 or higher. 5. Clear Drupal caches after update.
🔧 Temporary Workarounds
Disable Monster Menus module
allTemporarily disable the vulnerable module until patching is possible
drush pm-disable monster_menus
Implement additional access controls
allAdd extra authentication or IP-based restrictions to sensitive menu items
🧯 If You Can't Patch
- Disable the Monster Menus module immediately
- Implement web application firewall rules to block suspicious menu access patterns
🔍 How to Verify
Check if Vulnerable:
Check Monster Menus module version in Drupal admin at Extend > Installed modules, or run: drush pm-list | grep monster_menus
Check Version:
drush pm-list --fields=name,version | grep monster_menus
Verify Fix Applied:
Verify Monster Menus module version is 9.3.2 or higher, or test that restricted menu items properly enforce access controls
📡 Detection & Monitoring
Log Indicators:
- Multiple 403 errors followed by 200 successes for the same user on restricted paths
- Unauthorized access attempts to admin menu items
Network Indicators:
- Unusual patterns of requests to menu items that should be restricted
SIEM Query:
source="drupal_access_log" (status=200 AND uri CONTAINS "/admin/") AND user_role!="administrator"